Embedded Software // Articles

Showing results for: static analysis
Refine Embedded Software articles:
embedded linux embedded software software analysis rtos real-time operating system embedded real-time operating system arinc 653 embedded os embedded real time embedded realtime lynxos osek psos qnx os real time real time embedded software real time embedded system real time embedded systems real time kernel real time operating system real time operating systems real time os real time system real time systems real-time operating systems realtime realtime operating system realtime os rtxc threadx vrtx vx works vxworks vxworks os interface designer embedded gui nucleus ment1 meng static analysis embedded system programming java tools embedded software system embedded software systems embedded software company embedded software companies embedded software development embedded software architecture embedded software design embedded programming embedded software engineering embedded java java software software debug switch management execution sequencing runtime memory cyassl windows ce c windowsce ce download windows embedded ce for windowsce microsoft windows ce.net microsoft windows ce.net 4.2 microsoft.windowsce opennetcf.windowsce or windowsce pocket pc database pocket pc development programming windows embedded ce 6.0 public.windowsce virtual pc/windows ce win ce wince window ce 5 window ce 6 window ce download window ce.net windows ce.forms windows ce.net windows ce.net 5 windows embedded windows embedded ce windows embedded ce 6 windows embedded ce 6.0 windows mobile windows mobile ce windows mobile software windows pocket windows xp ce windows xpe windowsce 4.2 windowsce device windowsce software windowsce.forms windowsce.net embedded: dev tools and os
  • safety certification and security
     → September 2016
    Test and analysis tools help verify and enforce security in military systems

    Test and analysis tools help verify and enforce security in military systems

    Jay Thomas (LDRA Technology); Chriss Tapp (LDRA Technology)
    Secure coding practices, properly tested and verified, can help assure the reliable and safe operations of military systems. Organizations should start from the ground up, using a combination of static and dynamic analysis, unit and integration testing, and requirements traceability.

    Static analysis
     → April 2016
    White Paper: Addressing Security Vulnerabilities in Embedded Applications Using Best Practice Software Development Processes and Standards

    White Paper: Addressing Security Vulnerabilities in Embedded Applications Using Best Practice Software Development Processes and Standards

    Staff (PRQA)
    This white paper offers an introduction to applying CWE coding guidelines and achieving CERT security compliance using static analysis tool.

    Automotive
     → October 2015
    White Paper: MISRA: An Overview

    White Paper: MISRA: An Overview

    Paul Burden (PRQA - Programming Research); Jill Britton (PRQA)
    You don't have to take much interest in the world of embedded software before you learn about coding standards and then become aware of MISRA C. A little further in and you become aware that there is more to MISRA than just MISRA C. This paper provides a quick overview of MISRA, coding standards and... [read more]

    Static code analysis
     → April 2016
    White Paper: Addressing Security Vulnerabilities at the Source: A Guide to Using Static Source Code Analysis to Develop More Secure Embedded Software

    White Paper: Addressing Security Vulnerabilities at the Source: A Guide to Using Static Source Code Analysis to Develop More Secure Embedded Software

    Staff (PRQA)
    While there are a variety of security tools and methods that can be applied at different stages of the software development lifecycle, proponents of all methodologies agree on one point: Developers need to thoroughly examine source code to identify security-relevant defects. To this end, static ana... [read more]

    Static analysis
     → April 2016
    White Paper: How IoT is Making Security Imperative for All Embedded Software

    White Paper: How IoT is Making Security Imperative for All Embedded Software

    Staff (PRQA)
    While there are a variety of security tools and methods that can be applied at different stages of the software development lifecycle, proponents of all methodologies agree on one point: Developers need to thoroughly examine source code to identify security-relevant defects. To this end, static ana... [read more]

    Static analysis
     → October 2016
    White Paper: Finding Concurrency Errors with GrammaTech Static Analysis

    White Paper: Finding Concurrency Errors with GrammaTech Static Analysis

    Staff (GrammaTech)
    Multithreading adds entirely new classes of potential bugs to those that must be considered by developers. At the same time, the nondeterminism and sheer number of possibilities introduced by thread interleaving make it significantly more difficult to find bugs in multithreaded systems by testing an... [read more]

    embedded hardware
     → October 2016
    RF transceivers provide breakthrough SWaP solutions for defense and aerospace applications

    RF transceivers provide breakthrough SWaP solutions for defense and aerospace applications

    David Brown (Analog Devices, Inc.); Wyatt Taylor (Analog Devices, Inc.)
    Integrating more software control and cognitive abilities to military radios demands a more frequency- and bandwidth-flexible radio frequency (RF) design. To achieve this goal, static filters need to be removed and replaced with tunable filters. Similarly, the concept of a common platform would allo... [read more]

    Embedded software
     → March 2017
    White Paper: Automate Code Review with Formal Semantic Analysis

    White Paper: Automate Code Review with Formal Semantic Analysis

    Ram Cherukuri (MathWorks)
    Discover best practices for writing robust, secure, and reliable software that meets industry standards. Learn how you can automate your code review process, which means you can do the analysis without executing the program or developing test cases.

     → 14th Edition

    Making the Fog Smarter

    John Crupi, Chief Technology Officer (Predixion Software)
    According to the 2016 ABI Research report, "Edge Analytics in IoT," organizations currently use only 10 percent of the data generated by the Internet of Things (IoT), and an even smaller amount undergoes deeper analysis. Nevertheless, many organizations continue to target the cloud as the assumed, e... [read more]

    Signal processing
     → September 2017
    Analysis of modern radar and electronic warfare signals using advanced RF measurement techniques

    Analysis of modern radar and electronic warfare signals using advanced RF measurement techniques

    Philip Gresock (Keysight Technologies)
    Modern radar and electronic warfare (EW) systems rely on sophisticated signal processing and complex radio-frequency (RF) modulation on pulse. Without proper signal design verification, these techniques may not be effective during critical engagements, which could be catastrophic for the operator. D... [read more]

    Embedded software
     → April 2016
    White Paper: Developing Secure Embedded Software

    White Paper: Developing Secure Embedded Software

    Staff (PRQA)
    Any organization that ignores the warning signs of increased cyber attacks is likely to suffer economic consequences when it becomes the next target. This paper explains why some commonly used approaches to incorporating security into software development lifecycles typically fail and outlines a dev... [read more]

    Signal processing
     → September 2016
    Oscilloscope segmented memory and pulse analysis software provide FM chirp pulsed RF evaluation

    Oscilloscope segmented memory and pulse analysis software provide FM chirp pulsed RF evaluation

    Brad Frieden (Keysight Technologies)
    A class of pulsed radio frequency (RF), microwave, and mmWave applications present a measurement challenge to radar and electronic warfare (EW) designers due to the need for wide analysis bandwidth, as well as a desire to evaluate a significant time period of system activity. Segmented memory in wid... [read more]

    Source Code Analysis
     → October 2016
    White Paper: Eliminating Vulnerabilities in Third-Party Code with Binary Analysis

    White Paper: Eliminating Vulnerabilities in Third-Party Code with Binary Analysis

    Staff (GrammaTech)
    Over the last few years, third-party code has moved from a minor factor in software development to a dominant force in the industry. It is now used throughout software development in all applications, from highly sensitive government and military applications to security-intensive consumer commerce ... [read more]

    embedded hardware
     → July/August 2016
    Turbocharge HPEC system design with HPC development tools

    Turbocharge HPEC system design with HPC development tools

    Tammy Carter (Curtiss-Wright Defense Solutions)
    As parallel programming grows in importance and popularity, the critical challenge has become how to intelligently manage, develop, and debug the increasingly complex code. Traditional tools such as trace analysis, serial debuggers, and the venerable "printf"statement just aren't up to the task. Alt... [read more]

     → September 2018
    Electronics funding for radar, electronic warfare, C4ISR continues to rise

    Electronics funding for radar, electronic warfare, C4ISR continues to rise

    John McHale (Editorial Director)
    The defense market for embedded electronics designers continues to be a growth area. While increased use of commercial off-the-shelf (COTS) technology has lowered the cost and therefore the spending in unmanned systems, it is fueling more innovation, especially in small platforms.

    Signal processing
     → September 2017
    C4ISR, radar, electronic warfare, unmanned markets continue growth

    C4ISR, radar, electronic warfare, unmanned markets continue growth

    John McHale (Editorial Director)
    As threats evolve globally the demand and investment continues to grow in military application areas such as electronic warfare (EW), radar, unmanned systems, and communications, computers, intelligence, surveillance and reconnaissance (C4ISR).

    embedded hardware
     → February/March 2016
    Motor control in \

    Motor control in "more electric" aircraft

    Shen Wang (Microsemi)
    Many of the problems with the increasing complexity of motor controls for the brushless AC motors being used on MEA actuators can be solved with the implementation and use of flash-based FPGAs as their primary controller.

    market analysis
     → September 2015
    C4ISR funding a bright spot in military electronics market

    C4ISR funding a bright spot in military electronics market

    John McHale (Editorial Director)
    Market analysis in military electronics market

    embedded software
     → October 2015
    Encrypting storage in small form factors

    Encrypting storage in small form factors

    Carey Johnson (Microsemi)
    Self-encryption drives that fit into small-form-factor applications.

    supply chain
     → January 2016
    White Paper: Next Generation Bill of Materials Management: Beyond BOM 101

    White Paper: Next Generation Bill of Materials Management: Beyond BOM 101

    Staff (Arena Solutions)
    In the world of product design and manufacturing, the bill of materials (BOM) is a critical product information record for both the engineering and manufacturing teams. Managing BOMs with the wrong tools can cause product errors, delays and compliance failures. In this white paper, we outline the pr... [read more]

    Signal processing
     → April/May 2018

    Pushing airborne ISR data recorders to new performance heights

    Paul Davis (Curtiss-Wright Defense Solutions)
    Capturing wire rate data from today's compute-intensive intelligence, surveillance, and reconnaissance (ISR) sensor platforms brings new meaning to the old metaphor "drinking from a fire hose." Airborne ISR systems may have hundreds of cameras and other sensors that generate data that needs to be ca... [read more]

    GPUs
     → October 2015
    White Paper: Perceptual Computing: Inflection Point for Embedded Applications

    White Paper: Perceptual Computing: Inflection Point for Embedded Applications

    Andrew Rawson, Senior Member Technical Staff (AMD)
    To perceive is to assign meaning to what we see, hear, touch, taste and smell. Similarly, perceptual computing offers users a more natural way to interact with machines. Today's platforms have the ability to go well beyond simple facial recognition, which is becoming quite common today as a way to r... [read more]

    embedded hardware
     → November 2015
    Battling the heat in military CPUs

    Battling the heat in military CPUs

    Tim Fleury (Mercury Systems)
    By understanding the thermal profile for each component that makes up a system using CFD, it is possible to innovate methods for the mass transfer of thermal energy.

    Oscilloscopes
     → April 2016
    White Paper: High-Resolution Measurements with R&S Oscilloscopes

    White Paper: High-Resolution Measurements with R&S Oscilloscopes

    Staff (Rohde & Schwarz GmbH)
    With the RTO-K17/RTE-K17 High Definition Option the user will see more signal details with up to 16 bit vertical resolution. In combination with the superior analog front end of the RTO and RTE, the user has a versatile instrument in his hands to analyze a wide range of applications. From Switch Mo... [read more]

    Automotive
     → March 2017
    White Paper: Key Considerations for Powertrain HIL Test

    White Paper: Key Considerations for Powertrain HIL Test

    Author (National Instruments)
    HIL simulation meticulously tests embedded control devices in a virtual environment before proceeding to real-world tests of the complete system.

    Automotive systems
     → June 2016
    White Paper: Key Considerations for Powertrain HIL Test

    White Paper: Key Considerations for Powertrain HIL Test

    Author (National Instruments)
    Hardware-in-the-loop (HIL) simulation is a real-time test technique used to test embedded control devices more efficiently. This whitepaper covers recommended best practices for powertrain HIL testing.

    Storage
     → December 2015
    White Paper: Automation Industry: Industry 4.0 Challenges and Solutions for Storage Devices

    White Paper: Automation Industry: Industry 4.0 Challenges and Solutions for Storage Devices

    Staff (ATP Electronics)
    Industry 4.0 (the 4th revolution), representing the integration of Cyber and Physical systems concept, has been the ultimate hot topic since its first introduction in 2011. The idea of a "Smart Factory" emerges and its sophisticated control systems/platforms enable process optimization, data capture... [read more]

    embedded hardware
     → January 2016
    Next-gen military radar system design innovations

    Next-gen military radar system design innovations

    Sally Cole (Senior Editor)
    The maturity of GaN technology isn't being driven by the military industry, but instead was primarily driven by the telecom industry well over a decade ago.

    xTCA
     → Spring 2017
    SHB Express still going strong - PICMG 1.3 application examples

    SHB Express still going strong - PICMG 1.3 application examples

    Jim Renehan (Trenton Technology)
    PICMG got its start back in 1994 with the development of the first edge card computing industry standard: PICMG 1.0. Since then edge card computing has evolved to incorporate the latest PCI Express interface methodology and implementation standards in the SHB Express or PICMG 1.3 industry standard.

    Embedded software
     → October 2015
    Military software-defined radio benefits from commercial and consumer trends

    Military software-defined radio benefits from commercial and consumer trends

    Darren McCarthy (Rohde & Schwarz)
    Commercial trends in the cellular industry are directly applicable to the needs of defense electronics.

    embedded hardware
     → July/August 2015
    Counterfeit IC threat evolves with spread of clone parts

    Counterfeit IC threat evolves with spread of clone parts

    John McHale (Editorial Director)
    The better government and industry get at detecting counterfeit parts, the better counterfeiters get at fooling detection techniques, especially today with remanufactured or cloned parts adding to the threat. They are an imminent threat as they can permeate military systems, from fighter jets to nuc... [read more]

    LTE
     → April 2016
    White Paper: LTE and Bluetooth in-device coexistence with WLAN

    White Paper: LTE and Bluetooth in-device coexistence with WLAN

    Staff (Rohde & Schwarz GmbH)
    Modern mobile phones can support cellular and noncellular wireless communications standards at the same time. This means, however, that the subsystems must operate in very close proximity to each other within a single device (in-device coexistence). The resulting high level of reciprocal leakage can... [read more]

    embedded hardware
     → January 2016

    Designing COTS for data security

    Charlotte Adams (Abaco Systems)
    FPGA technology, for example, can be used to provide a "security hub" around which an antitamper strategy can be built.

Close

Subscribe to Embedded Software updates